The business case for XDR

Traditionally, organisations have relied on endpoint detection and response (EDR) to ensure the integrity of their perimeter defences. But with malicious users focusing their efforts on more targeted attacks, XDR (X detection and response) has emerged as a more...

Phishing season is around the corner – don’t take the bait

The season for serious shopping is almost upon us – and with it comes the problems of phishing and fraud. As the annual holiday and related shopping season begins – traditionally ramping up in October and finally ending in January – organisations are...

Beware – identity is the new gold

Stolen identity is a highly potent tool for fraudsters, as a recent Carte Blanche insert featuring RS Components revealed. By Ayanda Kotobe, finance director at RS Components A buyer approached us to procure equipment on credit to the tune of R1,5-million. But...

Safeguard your data in the online world

In a world ruled by data, it is frightening to think how few people take protecting their information seriously. While it has become easy to share everything from your email address and mobile number to more sensitive things such as your ID number and other personal...

Essential security skills for all employees

Cybercrime is a problem that affects everyone. It doesn’t matter how big or small the company may be, it is at risk of breach, fraud, hack, and theft. The statistics around the costs of cybercrime are plentiful, as are those that highlight the percentage growth...

Best-practice in the event of a data breach

We’ve all heard the famous prophecy that states: if we fail to prepare then we must prepare to fail. This statement is never more relevant than in the event of a data breach. By Steve Benton, BT deputy chief security officer, GM of cyber and physical security...